采纳 发表于 2025-3-23 12:18:36

Expiration and Revocation of Keys for Attribute-Based Signaturesvalidity interval, and a scheme in which sets of attributes share validity intervals. All of our schemes provide anonymity to a signer, hide the attributes used to create the signature, and provide collusion-resistance between users.

淘气 发表于 2025-3-23 14:11:20

Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysised strong positive communities are more likely to be opinion spammer groups. In fact, our results show that our approach is comparable to the existing state-of-art content-based classifier, meaning that our approach can identify spammer groups reliably even if spammers alter their contents.

喃喃而言 发表于 2025-3-23 20:20:29

FamilyID: A Hybrid Approach to Identify Family Information from Microblogso serve as a warning to users that they may have accidentally revealed too much personal/family information to the public. It could also help microblog users to evaluate the amount of information that they have already revealed.

Coronary-Spasm 发表于 2025-3-24 01:26:54

http://reply.papertrans.cn/27/2633/263228/263228_14.png

reception 发表于 2025-3-24 04:13:01

An Administrative Model for Relationship-Based Access Controlols changes to all aspects of the ReBAC policy. To the best of our knowledge, it is the first comprehensive administrative model for a ReBAC model suitable for general computing systems. The model is illustrated with parts of a sample access control policy for electronic health records in a healthcare network.

格子架 发表于 2025-3-24 07:55:03

0302-9743computation; access control and authorization; user privacy; authentication and information integration; privacy and trust; access control and usage policies; network and internet security; and information flow and inference.978-3-319-20809-1978-3-319-20810-7Series ISSN 0302-9743 Series E-ISSN 1611-3349

欺骗世家 发表于 2025-3-24 12:21:19

Conference proceedings 2015ted from 45 submissions. The papers are organized in the following topical sections: data anonymization and computation; access control and authorization; user privacy; authentication and information integration; privacy and trust; access control and usage policies; network and internet security; and information flow and inference.

SSRIS 发表于 2025-3-24 16:31:57

María Lucía Violini,Cecilia Verónica Sanze-off between information confidentiality and query plan efficiency. The evaluation shows that when sharing more than 30 % of query planning information between coalition parties, the CQP service is able to generate reasonably efficient query plans. We also outline potential improvements of the CQP service at the end.

嘲弄 发表于 2025-3-24 19:33:43

https://doi.org/10.1007/978-3-030-48325-8ols changes to all aspects of the ReBAC policy. To the best of our knowledge, it is the first comprehensive administrative model for a ReBAC model suitable for general computing systems. The model is illustrated with parts of a sample access control policy for electronic health records in a healthcare network.

AMITY 发表于 2025-3-25 01:09:05

http://reply.papertrans.cn/27/2633/263228/263228_20.png
页: 1 [2] 3 4 5
查看完整版本: Titlebook: Data and Applications Security and Privacy XXIX; 29th Annual IFIP WG Pierangela Samarati Conference proceedings 2015 IFIP International Fe